?1Option1@@YGXKD0
Static task
static1
Behavioral task
behavioral1
Sample
d7f6d766d8956192257362bedd5893892c7c04289240c1073048b6c5c867c54f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d7f6d766d8956192257362bedd5893892c7c04289240c1073048b6c5c867c54f.exe
Resource
win10v2004-20220812-en
General
-
Target
d7f6d766d8956192257362bedd5893892c7c04289240c1073048b6c5c867c54f
-
Size
207KB
-
MD5
7ed1ef5c8e63cecb8108e654ea50b820
-
SHA1
63b7bc53dee0743d3c3ae970a9b13dad906fdf41
-
SHA256
d7f6d766d8956192257362bedd5893892c7c04289240c1073048b6c5c867c54f
-
SHA512
76cfc8247737b0219312f4b7c1ef70c10114548171d89a8a4bf61a37fe433a1bcaae9c0427e200bde25de8d570638061d73c61401e6e0f650c636cd14cbbf5a3
-
SSDEEP
6144:JR33CEnX96hwak3Qt/wLuX35BGp7B3B9IjYm20w:Zt6hfkgoy3XGPIE
Malware Config
Signatures
Files
-
d7f6d766d8956192257362bedd5893892c7c04289240c1073048b6c5c867c54f.exe windows x86
47b7752bfde48c53b6218d9ecc639ee6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
DeleteObject
PlayEnhMetaFile
ExtFloodFill
EnumFontsW
CreateHatchBrush
GetLayout
user32
GetMenuItemID
GetCaretBlinkTime
GetDC
GetAsyncKeyState
VkKeyScanA
GetFocus
kernel32
GetCurrentProcess
GetSystemWindowsDirectoryW
GetUserDefaultLCID
GetProcessHeap
GetTickCount
Exports
Exports
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.init Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.crt Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.main Size: 4KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ram0 Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ram1 Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ